咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Tamper Detection and Localizat... 收藏

Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique

作     者:Ali A.R.Alkhafaji Nilam Nur Amir Sjarif M.A.Shahidan Nurulhuda Firdaus Mohd Azmi Haslina Md Sarkan Suriayati Chuprat 

作者机构:Razak Faculty of Technology and InformaticsUniversity Teknologi MalaysiaKuala Lumpur54000Malaysia 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2021年第68卷第7期

页      面:77-102页

核心收录:

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:funded by MOHE(FRGS:R.K130000.7856.5F026) Received by Nilam Nur Amir Sjarif 

主  题:Text watermarking tamper detection authentication quranic text exclusive-or operation queuing technique 

摘      要:The text of the Quran is principally dependent on the Arabic ***,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face ***,the diacritical marks in the Holy Quran which represent Arabic vowels(i,j.s)known as the kashida(or“extended letters)must be protected from *** cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR),and Normalized Cross-Correlation(NCC);thus,the location for tamper detection accuracy is *** gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with *** enhance the watermarking scheme of the text of the Quran based on hybrid techniques(XOR and queuing techniques)of the purposed *** methodology propose scheme consists of four phases:The rst phase is *** is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is“1,it inserts the kashida but does not insert the kashida if the bit is“0.The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility),and NCC(for the security of the watermarking).Experiments were performed on three datasets of varying lengths under multiple random locations of insertion,reorder and deletion *** experimental results were revealed the improvement of the NCC by 1.76%,PSNR by 9.6%compared to available current schemes.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分